Sciweavers

625 search results - page 96 / 125
» Generalized Ring Signatures
Sort
View
CHI
2005
ACM
16 years 6 days ago
ImproViz: visual explorations of jazz improvisations
ImproViz is a visualization technique for diagramming music that brings to light the signature patterns of a jazz musician's improvisational style. ImproViz consists of two p...
Jon Snydal, Marti A. Hearst
DCC
2001
IEEE
15 years 11 months ago
Cryptography in Quadratic Function Fields
We describe several cryptographic schemes in quadratic function fields of odd characteristic. In both the real and the imaginary representation of such a field, we present a Diffi...
Renate Scheidler
SOFSEM
2009
Springer
15 years 8 months ago
Expressiveness of Multiple Heads in CHR
Abstract. Constraint Handling Rules (CHR) is a general purpose, committedchoice declarative language which, differently from other similar languages, uses multi-headed (guarded) ru...
Cinzia Di Giusto, Maurizio Gabbrielli, Maria Chiar...
MIR
2010
ACM
206views Multimedia» more  MIR 2010»
15 years 6 months ago
3d object retrieval using salient views
This paper presents a method for selecting salient 2D views to describe 3D objects for the purpose of retrieval. The views are obtained by first identifying salient points via a ...
Indriyati Atmosukarto, Linda G. Shapiro
SAC
2010
ACM
15 years 6 months ago
Botzilla: detecting the "phoning home" of malicious software
Hosts infected with malicious software, so called malware, are ubiquitous in today’s computer networks. The means whereby malware can infiltrate a network are manifold and rang...
Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorst...